Xcentric Security Stack (Part 2)

Xcentric Security Stack (Part 2)

*Read Part 1 here. Physical Security The next layer of security that protects the Xcentric Cloud exists at the data center and in the data center firewall. Enterprise level firewall devices regulate the flow of data in and out of the network. Advanced physical...
Xcentric Security Stack (Part 1)

Xcentric Security Stack (Part 1)

Enterprise Multilayered Defense In the threat-filled environment that CPA firms operate in, what is the best way for a firm to protect its network? It would be great if there was a single easy answer or a single software solution to ensure that firms never have to...
BYOC (Bring Your Own Computer) Considerations

BYOC (Bring Your Own Computer) Considerations

Migrating from a traditional in-house network to a cloud-hosted network provides CPA firms with many benefits and opportunities. One of those benefits is flexibility. Employees are no longer dependent on a singular workstation, located in a physical office that’s only...
Hosted Applications or VDI

Hosted Applications or VDI

There is more than one way to deliver applications and data. The term “cloud is opaque” (when it comes down to actual user experience) can mean different things. At the core, cloud hosting involves applications or data hosted in a datacenter which is then...
How Does Ransomware Impact Xcentric Cloud Users?

How Does Ransomware Impact Xcentric Cloud Users?

Ransomware defense is not something that CPA firms can afford to neglect. Ransomware is a broad name given to a class of rogue software that is maliciously used to encrypt unsuspecting CPA firms’ files. Once the virus is in place on a workstation or a server,...